docs: Add missing spaces around code spans.

Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
Anders Kaseorg
2023-12-13 23:28:24 -08:00
committed by Anders Kaseorg
parent 10ef308848
commit a13e42f18a
8 changed files with 10 additions and 10 deletions

View File

@@ -747,7 +747,7 @@ integration](../production/scim.md).
`https://authentik.company/application/saml/<application slug>/sso/binding/redirect/` where `<application slug>`
is the application slug you've assigned to this application in Authentik settings (e.g `zulip`).
1. Update the attribute mapping in your new entry in `SOCIAL_AUTH_SAML_ENABLED_IDPS` to match how
Authentik specifies attributes in its`SAMLResponse`:
Authentik specifies attributes in its `SAMLResponse`:
```
"attr_user_permanent_id": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
@@ -791,7 +791,7 @@ this with another IdP.
Disable `Force POST Binding`, as Zulip only supports the Redirect binding.
1. In `Fine Grain SAML Endpoint Configuration`, set `Logout Service Redirect Binding URL`
to the same value you provided for `SSO URL` above.
1. Add the IdP's `Redirect Binding URL`for `SingleLogoutService` to
1. Add the IdP's `Redirect Binding URL` for `SingleLogoutService` to
your IdP configuration dict in `SOCIAL_AUTH_SAML_ENABLED_IDPS` in
`/etc/zulip/settings.py` as `slo_url`. For example it may look like
this:

View File

@@ -568,7 +568,7 @@ Apache requires you use the hostname, not the IP address; see
### HAProxy configuration
Below is a working example of a HAProxy configuration. It assumes that
your Zulip server sits at `https://10.10.10.10:443`see
your Zulip server sits at `https://10.10.10.10:443`; see
[above](#configuring-zulip-to-allow-http) to switch to HTTP.
1. Follow the instructions to [configure Zulip to trust